1on1security.blogspot.com
1 On 1 Security Musings: January 2015
http://1on1security.blogspot.com/2015_01_01_archive.html
1 On 1 Security Musings. Information Security Musings from 1 On 1 Security. Monday, January 19, 2015. Utilizing Splunk server for TCP/IP Analysis. Splunk is a wonderful tool for a TON of things, both within the normal Systems Administration space and Information Security. Lots of folks use it as a centralized repository to collect syslog feeds, but it can do a LOT more. From within AWS Console, select Launch Instance, and search the AWS Marketplace for Splunk, clicking Select. By detault when attempting ...
1on1security.blogspot.com
1 On 1 Security Musings: Let's Have Dinner Now While Baby Laughing!
http://1on1security.blogspot.com/2015/01/lets-have-dinner-now-while-baby-laughing.html
1 On 1 Security Musings. Information Security Musings from 1 On 1 Security. Thursday, January 8, 2015. Let's Have Dinner Now While Baby Laughing! Let's Have Dinner Now While Baby Laughing! I Google'd this exact phrase, expecting to be able to properly attribute this mnemonic I learned back in the Windows 2000 MCSE days. Microsoft Windows resolves network names to IP addresses in the following order, and the first match is treated as gospel. Blank stares around the room. Subscribe to: Post Comments (Atom).
1on1security.blogspot.com
1 On 1 Security Musings: USB Friend or Foe? Data Loss Prevention
http://1on1security.blogspot.com/2014/12/usb-friend-or-foe.html
1 On 1 Security Musings. Information Security Musings from 1 On 1 Security. Saturday, December 27, 2014. USB Friend or Foe? It's the kind of thing that can create an acidic taste in your mouth, not unlike sucking on a greasy coin or that feeling you get when you know you're about to become ill. and that's before it becomes an international news story. I am of course speaking of the Sony hack. Device accessible to a host computing device and enables file transfers between the host and the USB device.
1on1security.blogspot.com
1 On 1 Security Musings: The only constant is change. Staying Current
http://1on1security.blogspot.com/2015/01/the-only-constant-is-change-staying.html
1 On 1 Security Musings. Information Security Musings from 1 On 1 Security. Thursday, January 8, 2015. The only constant is change. Staying Current. While I'm not a huge "security via obscurity" sort of person, I'm not one to divulge a full and complete configuration of any of the systems I've built, supported, or currently use, to the public at large. I think it was Stephen Northcutt from the SANS Institute that first caught my attention with, "Do your network people have their own website? The Market V...
1on1security.blogspot.com
1 On 1 Security Musings: Tor relays compromised by zero day
http://1on1security.blogspot.com/2014/12/tor-relays-compromised-by-zero-day.html
1 On 1 Security Musings. Information Security Musings from 1 On 1 Security. Friday, December 26, 2014. Tor relays compromised by zero day. Lizard Squad" are claiming to have compromised over 50% of Tor relay nodes via a zero-day exploit. Obviously, with control of enough nodes, they can observe enough traffic to render the anonymity provided by the software and network moot. Http:/ www.businessinsider.com/report-lizard-squad-attacking-tor-2014-12. Why isn't my relay being used more? Andrew Coyne, CISSP.
1on1security.blogspot.com
1 On 1 Security Musings: Are PPA's safe to add to my system and what are some “red flags” to watch out for?
http://1on1security.blogspot.com/2015/01/are-ppas-safe-to-add-to-my-system-and.html
1 On 1 Security Musings. Information Security Musings from 1 On 1 Security. Wednesday, January 14, 2015. Are PPA's safe to add to my system and what are some “red flags” to watch out for? As is so often the case on a virgin Ubuntu system, we may be inclined to issue the following to install Java:. Get update sudo apt. What's really happening behind the scenes? The folks over at AskUbuntu have provided some in-depth answers worth considering, not just when dealing with Java of course. From the top answers:.
1on1security.blogspot.com
1 On 1 Security Musings: Utilizing Splunk server for TCP/IP Analysis
http://1on1security.blogspot.com/2015/01/utilizing-splunk-server-for-tcpip.html
1 On 1 Security Musings. Information Security Musings from 1 On 1 Security. Monday, January 19, 2015. Utilizing Splunk server for TCP/IP Analysis. Splunk is a wonderful tool for a TON of things, both within the normal Systems Administration space and Information Security. Lots of folks use it as a centralized repository to collect syslog feeds, but it can do a LOT more. From within AWS Console, select Launch Instance, and search the AWS Marketplace for Splunk, clicking Select. By detault when attempting ...
1on1security.blogspot.com
1 On 1 Security Musings: Android Lock Screen Settings to Prevent Heartbreak
http://1on1security.blogspot.com/2015/01/android-lock-screen-settings-to-prevent.html
1 On 1 Security Musings. Information Security Musings from 1 On 1 Security. Thursday, January 15, 2015. Android Lock Screen Settings to Prevent Heartbreak. But let's presume the unthinkable has happened - your phone for whatever reason isn't with you. When I took inbound calls as a Verizon Tech Coach for a while, a HUGE number of calls were of the "please help me find my lost phone" variety, and I have to say, a large number of those calls didn't have a happy ending. In the Lock screen widgets screen, ta...